Unlock instant, AI-driven research and patent intelligence for your innovation.

Chanel access method based on decimal backoff

A channel access method and decimal technology, applied in the field of communication, can solve problems such as difficulty in fully utilizing channel resources, restricting the possibility of parallel transmission, reducing channel resource utilization, etc., to improve regional throughput and efficient channel resource utilization Efficiency, achieve simple effect

Inactive Publication Date: 2017-04-19
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the traditional binary backoff approach is used in the next-generation WLAN, if some key parameters (such as the CCA threshold) are set unreasonably, it will be difficult to adapt to the actual situation of the network and make full use of channel resources, thereby inhibiting the area throughput performance
For example, if the CCA threshold is set too low, it will lead to too many nodes that think the channel is "busy" at the same time, thus restricting the possibility of parallel transmission and reducing the utilization of channel resources; if the CCA threshold is set too high , it will lead to too many nodes that think the channel is "idle" at the same time, thus increasing the collision probability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chanel access method based on decimal backoff
  • Chanel access method based on decimal backoff
  • Chanel access method based on decimal backoff

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The embodiment side focuses on describing the fractional backoff process in a single channel environment. Such as figure 1 As shown in (a), the cell includes a station (Station, STA) 'S', and the distance between S and the access point (Access Point, AP) 'D' is d. exist figure 1 In (b), S and D perform a fractional backoff process on the channel (CH). After the backoff succeeds, S transmits data to D on the CH. The following will illustrate the specific operation process of the first embodiment.

[0036] Step 1: When the source node S sends data to the destination node D, S queries the CCA range it maintains at this time;

[0037] Step 1.1: S queries the CCA threshold value CCA maintained by itself at this time th , the CCA th It can be unique in the whole network, or it can be obtained by feedback from D during the last data transmission with S (when D receives the RTS, record the received power of the RTS frame as Pr, then Among them, SINR th Indicates the th...

Embodiment 2

[0052] The second embodiment focuses on describing the fractional backoff process after the backoff condition is introduced in a single channel environment. In this embodiment, a backoff condition is introduced to limit the access of nodes that contribute too little to the throughput performance of the network area, thereby alleviating network conflicts and improving the throughput performance of the network area. Such as figure 2 As shown, the cell includes two stations, 'S' and 'E', where S is closer to the AP, and E is farther away from the AP. The following will illustrate the specific operation process of the second embodiment.

[0053] Step 1 to Step 4: Same as Step 1 to Step 4 in Embodiment 1, through Steps 1 to 4, S and E respectively calculate their respective retreat speeds, expressed as ω BK and ω' BK , after that, go to step 5;

[0054] Step 5: At the end of their respective time slots, S and E judge whether they meet the backoff condition. If the backoff con...

Embodiment 3

[0059] Embodiment 3 focuses on describing that in a single channel environment, the AP adjusts the backoff weight α in the fractional backoff process according to the number of STAs in the current cell, where 0 image 3 In (a), there are two STAs in the cell, namely A and B; and in image 3 In (b), there are four STAs in the cell, namely A, B, C and E. The following will illustrate the specific operation process of the third embodiment.

[0060] Step 1: When the source node S sends data to the destination node D, S queries the CCA range it maintains at this time;

[0061] Step 1.1: The AP adjusts the back-off weight α of all STAs according to the number of STAs in the current cell. exist image 3 In (a), there are 2 STAs in the cell, and the AP appropriately increases the value of α to speed up the backoff speed of STAs, so as to make full use of channel resources. For example, take α=1.0; and in image 3 In (b), if there are 4 STAs in the cell, the AP appropriately reduces t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a channel access method based on decimal backoff. By accelerating the backoff speed of the node with large contribution to the area throughput, the finer backoff mode is achieved, and the relative priority level of the user in channel competition is further refined and resolved, so that the better collision backoff is achieved, and the more effective channel resource utilization rate is achieved. The method is simple to implement and is compatible with the IEEE 802.11 standard protocol, and can be applied to single channel and multi-channel environments. In addition, the method can be achieved in firmware of the network interface card and the drive program. In the method, the sender can pre-estimate the interference condition of the receiver so as to enable the backoff to be more accurate, thereby improving the area throughput.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a backoff mechanism. Background technique [0002] In order to reduce collisions in wireless networks, the IEEE 802.11 standard adopts a mechanism called Carrier Sense Multiple Access with Collision Avoidance (CSMA / CA). In the CSMA / CA mechanism, a node judges whether the channel is idle by performing carrier sense. When the channel is idle, the node starts to perform the binary exponential backoff (Binary Exponential Backoff) process. If the channel becomes busy during the backoff process, it needs to wait for a random period of time until the channel becomes idle again before continuing to backoff until the backoff Data can only be sent after the end to reduce the collision probability of data transmission. Among them, the binary exponential backoff algorithm used in the CSMA / CA mechanism is the key to reducing network conflicts. The so-called binary exponential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W28/04H04W74/08
CPCH04W74/085
Inventor 李波杨懋杨博闫中江
Owner NORTHWESTERN POLYTECHNICAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More